AWS Deck Template

Report 7 Downloads 34 Views
Berlin

Mapping traditional security technologies to AWS Dave Walker – Specialised Solutions Architect Security and Compliance Amazon Web Services UK Ltd

AWS’ Compliance “Display Cabinet” Certificates:

Programmes:

Why a Mapping of Security Controls?

• 2 primary reasons: – Dealing with Standards – Introducing the new, through the concepts of the familiar

• Also: – Tracking the state of the art – Enrico Fermi and Donald Rumsfeld

Why a Mapping of Security Controls?

• PCI-DSS – standards for merchants which process credit card payments and have strict security requirements to protect cardholder data. A pointin-time certification.

• SOC 1-3 – designed by the “big 4” auditors as an evolution of SSAE16 etc, and to address perceived shortcomings in ISO27001. A continuousassessment certification, covering process and implementation.

• ISO 27001 – outlines the requirements for Information Security Management Systems. A point-in-time certification, but one which requires mature processes.

Standards, Controls and Commonality

• Controls overlap between standards – see eg https://www.unifiedcompliance.com

• AWS master control list and mappings – 1800+ internal controls – Mappings to external standards – Engage auditors, and…

“Principles Rarely Change, but Implementations Do”

• Zeno’s Paradox: Achilles and the Tortoise – Technology (almost) always leads standards – In 2014, AWS made 516 feature updates (including new service launches)… – ISO27001, ISO9001, SOC1-3, PCI-DSS (and lots of others) are covered by various AWS services at the infrastructure and container layers – others aren’t – The AWS Marketplace is growing…

AWS Marketplace: One-stop shop for security tools

Advanced Threat Analytics

Application Security

Identity and Access Mgmt

Server & Endpoint Protection

Network Security

Encryption & Key Mgmt

Vulnerability & Pen Testing

“When I were a Lad…”: Traditional Controls

Service networks looked like:

instances

Amazon VPC

Elastic Load Balancing

router

Internet gateway

“When I were a Lad…”: Traditional Controls

Management networks looked like:

“When I were a Lad…”

Security technologies looked like:

But:

• AWS security controls are rather more extensive – Can’t readily be reduced to a 2D “onion” • (5 dimensions might about do it…)

• So, we have a table – And it’s not small (circa 110 rows…)

Start Here: • • • • • • • • • • • •

Infrastructure meta-security Host security Network security Logging and Auditing Resilience User Access Control and Management Cryptography and Key Management Incident Response and Forensics “Anti-Malware” Separation of Duty Data Lifecycle Management Geolocation

“Can our current Security Functions be mapped onto AWS?” AWS Environment Management Logging and Auditing Asset Management Management Access Control Configuration Management

Configuration

Monitoring

AWS CloudTrail AWS Config, API AWS IAM Web Console AWS CloudFormation AWS OpsWorks CLI API SDKs Amazon CloudWatch

“Can our current Security Functions be mapped onto AWS?” Network

AWS to Customer Networks Layer 2Network Segregation Stateless Traffic Management IPsec VPN Firewall/ Layer 3 Packet Filter IDS/IPS Managed DDoS Prevention

Internet and/or Direct Connect Amazon VPC Network Access Control Lists VPC VGW, Marketplace Security Groups AWS CloudTrail, CloudWatch Logs,SNS, VPC Flow Logging Included in Amazon CloudFront

Brand New DDoS Whitepaper:

• http://d0.awsstatic.com/whitepapers/DDoS_Whit e_Paper_June2015.pdf

“Can our current Security Functions be mapped onto AWS?” Encryption, Key Management Data-In-Flight Volume Encryption Object Encryption Key Management Dedicated HSMs Database Encryption

IPsec or TLS or your own Amazon EBS Encryption AmazonS3 Encryption (Server and Client Side) AWS Key Management Service AWS CloudHSM TDE (RDS / Oracle EE) Encrypted Amazon EBS (with KMS) Encrypted Amazon Redshift

“Can our Current Security Functions be mapped onto AWS?”

Data Management

Hierarchical Storage Deletion Protection Versioning Archiving

Amazon S3 Lifecycle Amazon S3 MFA Delete Amazon S3 Versioning Amazon Glacier

“Can our Current Security Functions be mapped onto AWS?”

Host / Instance Security

Traditional Controls Instance Management Incident Management Asset Management Instance Separation

Traditional Controls (mostly) Delete-and-promote More alternatives! “What the API returns, is true” PCI Level 1 Hypervisor Dedicated Instances

“Can our Current Security Functions be mapped onto AWS?”

• For some functions, AWS architecture will take you in a particular direction – for other functions, AWS architecture allows you to do more interesting things than on-premise. • Some examples:

“Familiar functions, made Cloud scale”:

• IAM: “RBAC writ large” – Fine-grained privilege – Further access controls • • • •

Source IP Time of day Use of MFA Region affected (a work in progress; works for EC2, RDS)

• Data Pipeline: “Cron writ large”

Asset Management, Logging and Analysis:

• “What the API returns, is true” • CloudTrail, Config, CloudWatch Logs – – – –

“Checks and balances” S3 append-only, MFA delete SNS for alerting Easy building blocks for Continuous Protective Monitoring

AWS CloudTrail

AWS Config

CloudWatch

IDS / IPS / WAF:

• Host vs network – Everything preventative needs to be inline • IPS / WAF in particular • Unless you wanted to have fun with RST packets

– Dealing with autoscaling – Separation of Duty / managed service?

• VPC Flow Logging

Immutability and Mandatory Access Control:

• S3 cross-account sharing • SELinux on EC2 – SELinux enforcing policy can be complicated to write – see eg http://www.tresys.com

Incident Management:

• Traditional infrastructure: – Manage and Mitigate? – Pursue and Prosecute?

• Cloud gives you a third option: – Replicate, repair, ringfence and redirect – You’re back up and running, with previous environment isolated for forensic examination

Regulatory Compliance:

• Deutsche BaFin, UK FCA • French ASIP Santé • …

Mapping traditional security technologies to AWS Dave Walker – Specialised Solutions Architect Security and Compliance Amazon Web Services UK Ltd

PLACE